So, for many, when the Digital Operational Resilience Act (DORA) came into effect in January, it was old news.
But having achieved readiness before the new year, how sure can you be that your estate has not been compromised by configuration drift?
What happens when a browser update changes security settings, when a Windows patch alters registry configurations, or when well-meaning IT staff make ad-hoc adjustments to resolve urgent operational issues?
UK financial institutions cannot afford complacency regarding DORA compliance. If your company is based in the UK and operates in the EU, you're clearly in its scope. And if your IT services are provided by a company in the EU, that entity is also in its scope.
The implications extend beyond simple regulatory compliance. DORA won't apply directly to the UK financial services sector, due to Brexit, although many financial firms operate in Europe so will have to comply with the Act. However, the rules are also part of a global regulatory push towards operational resilience, meaning UK-only institutions must prepare for similar domestic requirements.
Understanding DORA's scope reveals why configuration management is critical:
Each pillar depends fundamentally on maintaining consistent, compliant configurations across your entire IT estate. Together, they have created a level playing field of cyber protection requirements for all financial institutions operating in the EU or with suppliers in the EU.
DORA implementation for financial organisations can be broken down into 12 phases:
Strategic Foundation (Phases 1-3):
Core Technical Implementation (Phases 4-7)
Operational Excellence (Phases 8-12):
Following these 12 phrases will deliver a security-hardened IT estate ready for DORA compliance approval. But this approach recognises that any financial organisation must continuously improve to stay ahead of developing threats and that is DORA’s great challenge: compliance is not a destination but an ongoing operational requirement demanding persistent configuration management.
This phased implementation approach, whilst comprehensive, often overlooks the reality of configuration drift.
Organisations that have successfully implemented DORA compliance now face a critical challenge: maintaining compliance over time through effective configuration management.
Consider these critical gaps:
❌ Phase 6 Reality Check: Cybersecurity Controls Deployment
DORA requires various cybersecurity measures including network management, access control, authentication, change management, and patch management. However, deploying these controls once does not ensure they remain effective:
❌ Phase 7 Limitations: Business Continuity Degradation
Business continuity policies, response and recovery plans, and backup procedures require ongoing validation, yet traditional approaches struggle with:
❌ Phase 10 Monitoring Inadequacy
Testing and monitoring frameworks require comprehensive performance measurement and vulnerability assessment. However, without continuous configuration monitoring:
Configuration drift represents the silent underminer of DORA compliance efforts. Whilst organisations invest heavily in the initial 12-phase implementation, ongoing compliance deteriorates through:
❌ Technological Evolution Impact
❌ Operational Pressures
The manual approach to security hardening is to treat compliance as a project with a defined deadline. DORA puts an end to that approach in the financial services industries.
Manual configuration management cannot sustain DORA compliance requirements due to fundamental limitations in scale, timing, and documentation across entire enterprise estates with hundreds of settings per endpoint. DORA’s reporting timelines demand real-time configuration monitoring and immediate remediation capabilities that manual processes simply cannot deliver.
Added to that burden are the regular internal audits that require comprehensive configuration documentation and evidence of continuous compliance that exceed the capacity of manual tracking systems to provide accurately and consistently.
To solve these numerous problems, we recommend an automated solution that transforms the traditional implementation approach by embedding continuous compliance into each implementation phase:
✔️ Enhanced Phases 4-6: Automated Asset and Risk Management
✔️ Strengthened Phases 9-10: Continuous Incident Management and Monitoring
✔️ Improved Phases 11-12: Audit and Continuous Improvement Automation
You may have a false sense of security if you followed a comprehensive, phased DORA implementation programme that was completed in January 2025. Because DORA implementation is never complete. Once you have addressed the initial compliance requirements, you need to solve the fundamental challenge of maintaining compliance over time.
Most organisations successfully complete the initial implementation phases:
✓ Gap analysis completed - Initial assessment identifies non-compliance areas
✓ Senior management support obtained - Budget and resources allocated for project
✓ ICT risk management framework documented - Policies, procedures, and protocols written
✓ Cybersecurity controls deployed - Technical measures implemented across infrastructure
✓ Business continuity procedures established - Response and recovery plans documented
However, the ongoing operational requirements expose critical weaknesses:
✗ Configuration drift undetected - Security settings gradually deviate from baselines
✗ Manual monitoring overwhelmed - Hundreds of settings across thousands of endpoints
✗ Incident response compromised - Changed configurations affect detection capabilities
✗ Audit trail inadequate - Manual documentation cannot capture all changes
As cyber threats evolve and regulatory expectations intensify, reactive compliance approaches become increasingly inadequate. But there is an automated solution for DORA compliance which addresses deficiencies and prevents disruptions with robust risk management and response plans for cyber threats.
The modern compliance landscape demands solutions that provide continuous visibility, automated remediation, and comprehensive audit capabilities. APPtechnology's Endpoint Security Hardening solution represents this evolution, transforming compliance from periodic projects into one continuous, reliable, automated system.
Unlike the 12-phase DORA implementation, a typical implementation of APPtechnology Endpoint Security Hardening for DORA compliance looks something like this:
Current State Analysis:
Gap Identification:
Controlled Deployment:
Process Integration:
Enterprise Deployment:
Optimisation and Enhancement:
Your organisation achieved DORA compliance yesterday through significant effort and investment. The question facing every compliance officer today is straightforward: how will you maintain that compliance tomorrow, next week, and throughout the coming year?
Manual processes cannot provide the continuous compliance DORA demands. Configuration drift is inevitable. The only question is whether your organisation will detect and remediate it proactively or discover it during an audit or, worse, during a security incident.
APPtechnology's Endpoint Security Hardening solution eliminates this uncertainty. Our always-on compliance maintenance system ensures your organisation remains DORA-compliant not just today, but every day.
Contact us today to request a free 30 minute drift assessment and we will demonstrate how APPtechnology can identify non-compliance across a sample of your endpoints based on your existing security and, moreover, demonstrate how simple it is to apply and enforce the best practice settings for 100% compliance.